Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 13:33
Behavioral task
behavioral1
Sample
c8bc37438f89503365e032ce5d5ece7f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8bc37438f89503365e032ce5d5ece7f.exe
Resource
win10v2004-20240226-en
General
-
Target
c8bc37438f89503365e032ce5d5ece7f.exe
-
Size
2.9MB
-
MD5
c8bc37438f89503365e032ce5d5ece7f
-
SHA1
3dc3886d904fae9f52520877f6487cc3514a2dba
-
SHA256
f65f9e42ccb635f45fe31a8b3a757848d57c145dbcd5f930a99ca652e53de07c
-
SHA512
3e7001ecf4619cb90cc6db8baa00bd80ce075e776c5a70344eb060dc0658d6651dd5777781437f0fa3f1d1e4346c439673a2d9130845ba4bceebf85a9c445c61
-
SSDEEP
49152:VF1vXUvt2elwXMPIv6H2UP4cbSkON74NH5HUyNRcUsCVOzetdZJ:VF1vEvt2e6XwIvq2g4ctO4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4232 c8bc37438f89503365e032ce5d5ece7f.exe -
Executes dropped EXE 1 IoCs
pid Process 4232 c8bc37438f89503365e032ce5d5ece7f.exe -
resource yara_rule behavioral2/memory/3856-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023290-11.dat upx behavioral2/memory/4232-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3856 c8bc37438f89503365e032ce5d5ece7f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3856 c8bc37438f89503365e032ce5d5ece7f.exe 4232 c8bc37438f89503365e032ce5d5ece7f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4232 3856 c8bc37438f89503365e032ce5d5ece7f.exe 97 PID 3856 wrote to memory of 4232 3856 c8bc37438f89503365e032ce5d5ece7f.exe 97 PID 3856 wrote to memory of 4232 3856 c8bc37438f89503365e032ce5d5ece7f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8bc37438f89503365e032ce5d5ece7f.exe"C:\Users\Admin\AppData\Local\Temp\c8bc37438f89503365e032ce5d5ece7f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\c8bc37438f89503365e032ce5d5ece7f.exeC:\Users\Admin\AppData\Local\Temp\c8bc37438f89503365e032ce5d5ece7f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4988
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD55220e84c5bde6bd2e25df11322929d50
SHA140a90333b79b861f1f6b5d5400741f68c9100319
SHA25696f64a9b981ae04e8a072191271535e2c65f113975f7ddd5492c2759a954b24c
SHA51240d0321c3ba4f81a2dfcebc18ad75908e226e07b86b34171c03e403d1dfa184cad465f46aaf555a7bc644038daa35dc9c40027f0f8979d10b978d78b4cd9c31a